CISO2CISO.COM & CYBER SECURITY GROUP
Skip to content
CISO2CISO.COM - From Cyber Technicals to C-Levels Cyber Advisors.
Twitter
Linkedin-in
Youtube
Rss
The Most Complete Reference & News Site For The Global Cyber Community.
CISO´s Notepad & Pappers Series
Cyber Security Stories & News
Cyber Security Attacks & Incidents
Malware & Ransomware
Vulnerabilities & Zero Days
About US
Account Login
LASTEST NEWS
04/06/2023 - 7:23 PM -
Strengthening The Canadian Financial Sector’s Cybersecurity – Source: securityboulevard.com
04/06/2023 - 7:23 PM -
Dancho Danchev’s OSINT and Threat Intelligence Training Video Demonstration in Bulgarian – Part Two – Source: securityboulevard.com
04/06/2023 - 7:23 PM -
Dancho Danchev’s OSINT and Threat Intelligence Training Video Demonstration in Bulgarian – Part One – Source: securityboulevard.com
04/06/2023 - 7:23 PM -
Technical Analysis of Bandit Stealer – Source: securityboulevard.com
04/06/2023 - 7:23 PM -
Using Cloud Securely — The Config Doom Question – Source: securityboulevard.com
04/06/2023 - 6:23 PM -
Microsoft Sets Aside $425M For Anticipated GDPR Fine – Source: www.databreachtoday.com
04/06/2023 - 4:23 PM -
Xplain hack impacted the Swiss cantonal police and Fedpol – Source: securityaffairs.com
04/06/2023 - 4:23 PM -
Zyxel published guidance for protecting devices from ongoing attacks – Source: securityaffairs.com
04/06/2023 - 4:23 PM -
Kimsuky APT poses as journalists and broadcast writers in its attacks – Source: securityaffairs.com
04/06/2023 - 10:23 AM -
API security in the spotlight – Week in security with Tony Anscombe – Source: www.welivesecurity.com
04/06/2023 - 1:23 AM -
Insider Q&A: Artificial Intelligence and Cybersecurity In Military Tech – Source: www.securityweek.com
04/06/2023 - 1:23 AM -
In Other News: Government Use of Spyware, New Industrial Security Tools, Japan Router Hack – Source: www.securityweek.com
03/06/2023 - 11:24 PM -
Weekly Update 350 – Source: www.troyhunt.com
03/06/2023 - 10:24 PM -
Risk: Everything Everywhere All at Once – Source: www.cyberdefensemagazine.com
03/06/2023 - 9:19 PM -
Why do we compare a SOC (Security Operations Center) with the cockpit of a commercial airplane? by Marcos Jaimovich
03/06/2023 - 8:23 PM -
Microsoft Sets Aside $425M For Anticipated GDPR Fine – Source: www.govinfosecurity.com
03/06/2023 - 8:23 PM -
Hackers Using MOVEit Flaw to Deploy Web Shells, Steal Data – Source: www.govinfosecurity.com
03/06/2023 - 8:23 PM -
Chinese APT Backdoor Bypasses Indonesian Antivirus – Source: www.govinfosecurity.com
03/06/2023 - 7:23 PM -
The great CISO resignation: Why security leaders are quitting in droves – Source: www.proofpoint.com
03/06/2023 - 7:23 PM -
Online sellers targeted by new information-stealing malware campaign – Source: www.bleepingcomputer.com
Home
Pages: CISO2CISO Cyber Security Resources – CISO STRATEGIES
CISO STRATEGIES notepadS & resources
Marcos Jaimovich
Why do we compare a SOC (Security Operations Center) with the cockpit of a commercial...
Gartner Research
CISO Foundations – Cybersecurity Talent Strategies for CISOs by Gartner Research
Lawrence C. Miller
Data Leakage for Dummies by Lawrence C. Miller
CYLANCE
Introduction to Artificial Intelligence for Security Professionals free e-book by the Cylance Data Science Team...
BlackBerry CyberSecurity
BlackBerry Cybersecurity Global Threat Intelligence Report April-2023 Edition
Logan Simpson
3 questions your CEO has about Cybersecurity in simple terms by Logan Simpson
Marcos Jaimovich
Building a SECURE Minimum Viable Protection (SMVP) Product or Service. Software Quality must include Cybersecurity...
Harvard Business Review
Boards Are Having the Wrong Conversations About Cybersecurity – Board interactions with the CISO are...
Forrester - Allie Mellen
Adapt Or Die: XDR Is On A Collision Course With SIEM And SOAR – EDR...
INCIBE & SPAIN GOVERNMENT
DIRECTOR MASTER PLAN OF SECURITY BY INCIBE & SPAIN GOVERNMENT. (translated version from the original...
World Economic Forum
The Global Risks Report 2023 – Insight Report – 18th Edition by World Economic Forum...
BlakerHostetler
2023 Data Security Incident Response Report – Seurity Measures & Approach by BlakerHostetler
Proofpoint
2023 Voice of the CISO – Global Insights into CISO challenges, expectactions and priorities report...
exabean
A CISOs Guide to Defender Alignment by exabean
DNSSENSE
Things of the Internet Global Cyber Domain Report by DNSSense – H2 – 2022 Report
Orange Cyberdefense
Orange Cyberdefense Security Navigator 2023 – Research-driven insights to build a safer digital society
MANDIANT
MANDIANT – M-Trends 2023 – Mandiant Special Report
BlackBerry CyberSecurity
Global Threat Intelligence Report – Delivering Actionable and Contextualized Intel to Increase Cyber Resilience by...
WILEY
Phishing Dark Waters – The Offensive and Defensive Sides of Maliciosus Emails
ZERONORTH
Are Quality and Security Synonymous in Software by Zeronorth
Anish Roy
Quality Assurance for Software Development Must Include Cybersecurity – Why Cybersecurity and Software Quality Assurance...
Federico Hansen
What is Cyber Resilience and Why Your Business Needs It by Federico Hansen ?
David E. Sanger
The Perfect Weapon – WAR, SABOTAGE and FEAR in the Cyber Age by David E....
KATY ANTON - JIM MANICO - JIM BIRD
OWASP PRO Active Controls for Developers v. 3 – Securing Coding Best Practices – 10...
CSA Cloud Security Alliance
Security Implications of ChatGPT RC by Cloud Security Alliance – CSA
Tommy Babel
Executive Guide to Cyber Crisis Management 2023
Khoury-Avila-Brunelle-Mamadou
How Secure is Code Generated by ChatGPT ? by Khoury-Avila-Brunelle-Mamadou
GFCE
Introduction to Tabletop Exercises (TTX) – A practical Guidebook for Organizations by Capgemini for GFCE...
upstream
Global Automotive Cybersecurity Report 2022 – Automotive Cyber Threat Landscape in Light of New Regulations...
CRC Press
CISO Guidance Free Book by CRC Press
Gartner
A CISOs Guide for Conversations with the CFO by Gartner
Rockwell
Cybersecurity Preparedness in Critical Infraestructure – Avoinding The Big Shutdown
cepal.org
Cybersecurity and the role of the Board of Directors in Latin America and the Caribbean...
Apress
Zero Trust Security – An Enterprise Guide – Jason Garbis & Jerry Chapman – apress
Shawn Powers & Michael Jablonski
The Real Cyber War – The Political Economy of Internet Freedom by Shawn Powers &...
CISA
Zero Trust Matutity Model by CISA
CISA
Shifting the Balance of Cybersecurity Risk – Principles and Approaches for Secure-by-Design – Secure-by-Default –...
Enterprise Strategy Group - ESG
Cybersecurity in the C-suite and Boardroom by Jon Oltsik – Enterprise Strategy Group (ESG)
Deloitte
Communicating the value of cybersecurity to boards and leadership – Seven strategies for life sciences...
Google Cybersecurity Action Team
Perspectives on Security for the Board by Cybersecurity Action Team – Google Cloud – April...
NACD - Intenet Security Alliance
Director´s Handbook on CYBER-RISK OVERSIGHT by NACD – Internet Security Alliance
DRATA.COM
A Complete Guide to Cybersecurity Risk Management – Learn the ins and outs of risk...
ENISA
Identifying Emerging Cyber Security Threats and Challenges for 2030 by ENISA nad European Union Agency...
CISA
Cybersecurity Incident & Vulnerability Response Playbooks by CISA
ISACA
Reporting Cybersecurity Risk to the Board of Directors by ISACA
Marcos Jaimovich
Artificial intelligence was never a bad think – A self fulfilling Prophesy (My personal vision).
CISA
Making a Business Case for Security – An Interagency Security Committee Best Practice by CISA...
UFMCS ARMY
THE ARMY RED TEAM HANDBOOK – The Guide to Making Better Decisions version 9 by...
hackercombat
10 Cyber Security Myths You Need To Stop Believing by HACKER COMBAT COMMUNITY
Ninjio´s
Ninjio´s Cyber Hygiene Checklist – Level Up Your Cybersecurity
7 CEO CYBERSECURITY ACTIONS – START WORKING ON IT TODAY , DON´T WAIT !!!
NIST
Artificial Intelligence Risk Management Framework – AI RMF 1.0 By NIST
Microsoft Security
Data Loss Prevention from on-premises to cloud by Microsoft Security
ENISA-EUROPA
A Governance Framework for National Cybersecurity Strategies by European Union Agency for Cybersecurity – enisa
McKinsey
Cybersecurity in a Digital Era by McKinsey. Digital McKinsey and Global Risk Practice.
Microsoft Security
Threat Hunting Survival Guide by Microsoft Security Experts
ACSC Australia
Cyber Incident Response Plan Template by ACSC & Australian Goverment
CISA
Insider Threat Mitigation Guide by Cybersecurity Insfrastructure Security Agency
NSA
NSA CYBERSECURITY – YEAR IN REVIEW REPORT 2022. You must read IT !
US Deparment of Defense
DevSecOps Fundamentals Guidebook – Tools & Activities by American Deparment of Defense
IST
MAPPING THE RANSOMWARE PAYMENT ECOSYSTEM BY ZOE BRAMMER – IST Institute of Security and Technology
MANDIANT
THE DEFENDER´S ADVANTAGE – A GUIDE TO ACTIVATING CYBER DEFENSE BY MANDIANT
SecurityGen
Telecom Cybersecurity – 5G Protection Use Cases by SecurityGen
MITRE
11 STRATEGIES OF A WORLD-CLASS CYBERSECURITY OPERATIONS CENTERS HIGHLIGHTS BY MITRE
National Cyber Security
Cyber Security Toolkit for Boards – Helping board members to get to grips with cyber...
Hague Centre Strategic Stud
Cyber Arms Watch An Analysis of Stated & Perceived Offensive Cyber Capabilities by The Hague...
ACSC Australia
13 Questions for boards to ask about cyber security by Australian Cyber Security Centre –...
CISO Forum
CISO’s – First 100 Days Roadmap – Your success as a security leader is determined...
ANSSI & CCA France
Organising a Cyber Crisis Management Exercise – Positioning Cyber Resilience at the Highest Level by...
iapp
2022 PRIVACY TECH VENDOR REPORT by IAPP
UK Government
Detecting the Unknown – A Guide to Threat Hunting by UK Government
Microsoft Security
Building a Holistic Insider Risk Management Program – 5 elements that help companies have stronger...
CYFIRMA
ADVANCED SOCIAL ENGINEERING ATTACKS DECONSTRUCTED BY CFYRMA
BCG Global Cybersecurity Forum
Turning a Cybersecurity Strategy Into Reality A Holistic Performance Management Framework by BCG & STC
ICS2
A Resilient Cybersecurity Professionn Chart the Path Forward – ICS2 CYBERSECURITY WORKFORCE STUDY – A...
HARDVARD Kennedy School
National Cyber Power Index 2022 – HARDVARD Kennedy School – BELFER CENTER for Science and...
Arizona State University
THE FUTURE OF CYBER ENABLED FINANCIAL CRIME – New Crimes, New Criminals, and Economic Warfare...
CSC 2.0
2022 Annual Report on Implementation – CSC 2.0 by Jiwon Ma – Mark Montgomery
Splunk
Five Automation Use Cases for Splunk SOAR by Splunk – Alert Enrichment , Phishing Investigation...
ECIIA
2023 RISK IN FOCUS – Hot topics for internal auditors by ECIIA – VUCA context...
Dr. Erdal Ozkaya
Hiring a CISO – Super Guide for startups by Erdal Ozkaya
ISMS Forum & DPI
Guia Practica para la Gestion de Breachas de Datos Personas by ISMS and DPI
Argentina
Propuesta de Anteproyecto de Ley de Proteccion de Datos Personales – Ley 25326 – Agencia...
Cencys
2022 State of the internet report by cencys
Tenable.cs Cloud Security
7 Habits of Highly Effective DEVSECOPS Teams whitepaper by Tenable.cs Cloud Security – DevSecOps is...
European Commission
CYBER RESILIENCE ACT – New EU cybersecurity rules ensure more secure hardware and software products...
MSSP ALERT
TOP 250 MSSPs Services Providers 2022 edition by MSSP Alert – A CyberRisk Alliance Resource...
KROLL
Cyber Risk and CFOs – Over-Confidence is Costly – 2022 Edition by KROLL
CISA
CISA STRATEGIC PLAN 2023-2025 by Cybersecurity & Insfrastructure Security Agency
KPMG MEXICO & IPADE
Manual del Comite de Auditoria by KPMG Mexico & IPADE
MVP - Minimun Viable Protection
The Importance of Risk Appetite in Risk Assessment – by MVP – Minimun Viable Protection
IT Governance
Cyber Security and Business Resilience – Thinking strategically by IT Governance
stottandmay.com
The CISO Survival Guide – Practical advice for Security Leaders by stottandmay.com
SCYTHE
Better Cybersecurity Metrics – SOC Metrics – Threat Hunting Metrics – Cyber Threat Intelligence (CTI)...
MORE RESOURCES
CISO Strategics
cyber operations & soc
red - blue & purple teams
THREAT INTELLIGENCE
VULNERABILITIES
CYBER ATTACKS
DATA BREACH
MALLWARE
RANSOMWARE
DDOS ATTACKS
CLOUD SECURITY
IOT SECURITY
ot security
devsecops
hacking
risk & compliance
governance
data privacy
MORE CISO2CISO RESOURCES LIBRARY TO VIEW
CISO Strategics
SOC OPERATIONS
THREAT INTELLIGENCE
vulnerabilities
cyber attacks
RansoNWARE
DDOS ATTACKS
RED - BLUE & PURPLE
DATA BREACH
DATA PRIVACY
CLOUD SECURITY
IOT - OT SECURITY
RISK & COMPLIANCE
DEVSECOPS